Traditionally, big data, analytics and visualization tools have been used after the fact to analyze fraud and security breaches. In this session, we will demonstrate the proactive use of these technologies to help prevent these attacks from occurring in the first place.
See Also: Data Center Security Study - The Results
Leveraging findings from massive scale, real-life global network activity and transaction monitoring, we will discuss:
- How big data analytic modeling can be used to visualize the scope of both device and online persona threats;
- How to generate sophisticated transaction risk assessments by analyzing the context and patterns of prior visitor behavior;
- How to create indicators of cyber fraud activity by detecting malware infections, VPN and proxy masking, MitB and phishing detection and bot detection.